Tools

"... Abstract. Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, we investigate the ..."

, this is the first work that comprehensively analyzes, and evaluates the privacy implications of Bitcoin. As a by-product, we have designed and implemented the first simulator of Bitcoin; our simulator can be used to model the interaction between Bitcoinusers in generic settings. 1

"... This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile, locationdependent applications. It allows applications running on mobile and static nodes to learn their physical location by using listeners that hear and analyze informatio ..."

information from beacons spread throughout the building. Cricket is the result of several design goals, including userprivacy, decentralized administration, network heterogeneity, and low cost. Rather than explicitly tracking user location, Cricket helps devices learn where they are and lets them decide whom

"... Abstract. Bitcoin is a peer-to-peer (p2p) electronic cash system that uses a distributed timestamp service to record transactions in a public ledger (called the Blockchain). A critical component of Bitcoin’s success is the decentralized nature of its architecture, which does not require or even supp ..."

support the establishment of trusted authorities. Yet the absence of certification creates obstacles to its wider acceptance in e-commerce and official uses. We propose a certification system for Bitcoin that offers: a) an opt-in guarantee to send and receive bitcoins only to / from certified users; b

"... Lightweight Bitcoin clients are gaining increasing adoption among Bitcoin users, owing to their reduced resource and bandwidth con-sumption. These clients support a simplified payment verification (SPV) mode as they are only required to download and verify a part of the block chain—thus supporting t ..."

Lightweight Bitcoin clients are gaining increasing adoption among Bitcoinusers, owing to their reduced resource and bandwidth con-sumption. These clients support a simplified payment verification (SPV) mode as they are only required to download and verify a part of the block chain—thus supporting

"... Bitcoin has achieved large-scale acceptance and popularity by promising its users a fully decentralized and low-cost virtual currency system. However, recent incidents and observations are revealing the true limits of decentralization in the Bitcoin system. In this article, we show that the vital op ..."

Bitcoin has achieved large-scale acceptance and popularity by promising its users a fully decentralized and low-cost virtual currency system. However, recent incidents and observations are revealing the true limits of decentralization in the Bitcoin system. In this article, we show that the vital

"... An enhancement is suggested to make Bitcoin transaction amounts hidden to all but the sender and receiver. In each transaction, the output amounts are encrypted with the public keys of the respective receivers. Only the transaction fee is publicly revealed, to allow miners to prioritise transactions ..."

an additional public view key to allow senders to encrypt output values. This approach practically resolves a core privacy issue in Bitcoin[1], but without overwhelming implementation complex-ity. The required commitments are an order of magnitude smaller than those proposed for Confidential Transactions[2

"... A fundamental limitation of Bitcoin and its variants is that the movement of coin between addresses can be observed by examining the public block chain. This record enables ad-versaries to link addresses to individuals, and to identify multiple addresses as belonging to a single participant. Users c ..."

A fundamental limitation of Bitcoin and its variants is that the movement of coin between addresses can be observed by examining the public block chain. This record enables ad-versaries to link addresses to individuals, and to identify multiple addresses as belonging to a single participant. Users

"... [B]...a distributed peer-to-peer digital currency system... [b]...a digital record in the public ledger (BlockChain) that keeps track of electronic money ownership... Who does operate the Bitcoin? No central company. At least not yet. Spontaneous collaboration of network nodes operated by miners. An ..."

[B]...a distributed peer-to-peer digital currency system... [b]...a digital record in the public ledger (BlockChain) that keeps track of electronic money ownership... Who does operate the Bitcoin? No central company. At least not yet. Spontaneous collaboration of network nodes operated by miners

"... This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections. It considers attackers that obtain probabilistic information about users. The degree is based on the probabilities an attacker, after observing the ..."

the system, assigns to the dierent users of the system as being the originators of a message. As a proof of concept, the model is applied to some existing systems. The model is shown to be very useful for evaluating the level of privacy a system provides under various attack scenarios, for measuring